Patient Portal Phishing

Scammers send messages that look like your clinic or hospital. They push you to click a link and “log in” to view test results or fix your account. The link opens a fake portal that steals your username, password, or verification codes.
   

Fake Telehealth Clinics

These are look-alike websites or apps pretending to offer online doctor visits. They may promise instant appointments or “special offers,” then collect your personal details and payments. Always use official clinic channels and check the web address carefully.
   

Counterfeit Medicines

Scammers sell fake or unsafe medicines online, often at very low prices or “no prescription needed.” The products may be ineffective or dangerous, and your payment details can be stolen. Buy medicines only from regulated pharmacies and trusted sources.
   

Love-bombing

Scammers show intense affection very quickly—constant messages, big compliments, and “soulmate” talk. The goal is to create emotional attachment fast, so you trust them before you can verify who they are.
   

Catfishing

A scammer pretends to be someone else online, often using stolen photos or a fake identity. The profile may look “perfect,” but details are vague or inconsistent, and they avoid real-time proof like video calls.
   

Isolation

The scammer asks you to keep the relationship secret and discourages you from talking to family or friends. This isolates you from support and makes it easier for them to pressure you into sending money.
   

Personal data

this is information that can identify you, such as your name, phone number, email address, home address, or social security number. It should be shared with caution and only with trusted entities.
   

Privacy settings

these are options in apps, websites, and social media that let you decide who can see your data, photos, and activity.
   

Public profile

means that the information and photos are visible to everyone on the Internet, including strangers. This may increase the risk of fraud and abuse.
   

Strong password

A password that is long, unique, and difficult to guess. It does not contain personal information and is not used on multiple websites.
   

Two-step verification (2FA)

Additional account security that requires a second login step, such as an SMS code or confirmation in the app.
   

Malicious software

A program that can install itself without your knowledge and be used to spy on your data, lock your device, or steal information.
   

Smishing

A type of fraud in which criminals send fake SMS or text messages while pretending to be banks, courier companies, or official institutions in order to obtain data or money.
   

Fake login page

A website that looks like the real website of a bank or company, but is used to steal login details, passwords, or card information.
   

Time pressure

A manipulation technique that involves creating a sense of urgency or fear to make it harder for you to verify information calmly (for example, “your last chance” or “your account will be blocked”).
   

Impersonation Fraud

A type of cybercrime in which attackers falsely present themselves as legitimate institutions (such as banks, government agencies, or service providers) in order to gain trust and obtain sensitive information or money.
   

Institutional Trust Abuse

The misuse of public trust in well-known organizations by criminals who exploit familiarity and authority to manipulate individuals into complying with fraudulent requests.
   

Verification Mechanism

Technical or procedural methods used to confirm the authenticity of communications, services, or requests, such as official contact channels, security checks, or identity confirmation processes.
   

Vishing Call

Aa phone call from someone pretending to be a bank or crypto expert, trying to trick you into giving personal information or sending money.
   

Cryptocurrency

A cryptocurrency is a type of digital money that exists only online. It is not issued by a bank or government and is often used for online payments or investments.
   

Unsafe Investments

Sending money to unknown accounts, investing in unknown ryptocurrencies, or following unverified advice can lead to losing all your funds.
   

Deepfake

A technology that can be used to create realistic fake voices or videos with which scammers impersonate real people, for example pretending to be your grandchild or another family member.
   

Social Engineering

is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information.
   

Spoofing

A cybersecurity technique in which a scammer disguises their identity by faking an email address, phone number, website, or sender information to appear as a trusted source.
   

Fake Ads

can appear on social media, websites, or even on search engines like Google. They can look very real and usually offer amazing discounts to attract clicks. Clicking can lead to fake website.
   

Fake Websites

can look either very professional or very low-quality. Scammers use them to sell products that don’t exist, never arrive or are counterfeit items.
   

Unsafe Payments Methods

like wire transfers, prepaid cards, or cryptocurrency can let scammers take your money without any way to get it back.
   

Phishing

Scammers send fake emails or messages that look real. They try to make you click a link or share personal details, like your password or bank number.
   

URL (Uniform Resource Locator)

is the unique web address that identifies the specific location of a resource like a webpage, image, or file) on the internet, telling your browser how to find and retrieve it.
   

Data Privacy

This means keeping your personal information safe  like your name, address, or ID number. Share these details only on trusted websites or with people you know.

Τελευταία τροποποίηση: Τετάρτη, 18 Μαρτίου 2026, 11:29 AM